Hengtai Ma

According to our database1, Hengtai Ma authored at least 14 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Root Cause Analysis of Anomaly in Smart Homes Through Device Interaction Graph.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

HySense: Hybrid Event Occurrence Detection Method for IoT Devices.
Proceedings of the IEEE International Conference on Acoustics, 2024

Contextual Insight: Detecting Abnormal Device Behaviors in IoT Systems.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2020
Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2015
A dynamic marking method for implicit information flow in dynamic taint analysis.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

An Uneven Distributed System for Dynamic Taint Analysis Framework.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Survey on Privacy Protection of Android Devices.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

A Method of Handling Control Dependence in Dynamic Taint Analysis.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Efficient authentication of scalable media streams over wireless networks.
Multim. Tools Appl., 2014

A capacity self-adaption information hiding algorithm based on RS code.
Proceedings of the International Conference on Multisensor Fusion and Information Integration for Intelligent Systems, 2014

An encryption algorithm of JPEG2000 streams for supporting ciphertext-based transcoding.
Proceedings of the International Conference on Multisensor Fusion and Information Integration for Intelligent Systems, 2014

2013
Joint FEC codes and hash chains for optimizing authentication of JPEG2000 image streaming.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo, 2013

2012
Design and logical analysis on the access authentication scheme for satellite mobile communication networks.
IET Inf. Secur., 2012

2008
Analysis and Design on Key Updating Policies for Satellite Networks.
Int. J. Comput. Commun. Control, 2008


  Loading...